﻿1
00:00:00,890 --> 00:00:07,470
‫So being familiar with a file system of a tool might help you to exploit it a little bit better.

2
00:00:08,600 --> 00:00:12,230
‫So take some time to make yourself familiar with its file system.

3
00:00:13,440 --> 00:00:19,830
‫In order to do that, the best way to learn the structure of Métis Boyte is to browse through its directory.

4
00:00:20,960 --> 00:00:28,370
‫A display framework is provided in the user share Métis Boite framework directory in Collie Linux.

5
00:00:29,270 --> 00:00:34,310
‫And one could more easily understand the Boyd architecture by having a look under the hood.

6
00:00:35,580 --> 00:00:41,730
‫So let's examine the file system of Métis boy and see just how the framework is constructed.

7
00:00:43,600 --> 00:00:45,220
‫So I'm going to open a terminal.

8
00:00:46,230 --> 00:00:49,020
‫And let's have a look, see where we are.

9
00:00:50,320 --> 00:00:53,560
‫So I'm going to Métis Boyd framework directory.

10
00:00:54,800 --> 00:01:04,160
‫And when using Linux, the Métis boy framework is usually located in the path user share Métis Point

11
00:01:04,430 --> 00:01:05,120
‫framework.

12
00:01:06,810 --> 00:01:14,670
‫So let's see what we have here, right, so hopefully if you can see over my shoulder here, the MSF

13
00:01:14,670 --> 00:01:19,650
‫file system is organized by really well-defined directorate.

14
00:01:20,810 --> 00:01:22,610
‫And the structure is very clear.

15
00:01:24,150 --> 00:01:31,560
‫The Millers Point framework has a variety of component categories based on their role in the penetration

16
00:01:31,560 --> 00:01:32,490
‫testing phases.

17
00:01:33,500 --> 00:01:36,050
‫For example, here, the data folder.

18
00:01:37,440 --> 00:01:44,370
‫This directory stores editable files such as word lists and binaries required for some of the XPoint.

19
00:01:46,470 --> 00:01:54,270
‫So let me show you some of the WORDLIST directories that support uses these lists for brute force.

20
00:01:58,400 --> 00:01:59,720
‫The documentation folder.

21
00:02:01,440 --> 00:02:07,950
‫As its name suggests, the documentation directory contains the available documentation for the framework.

22
00:02:10,290 --> 00:02:15,510
‫Modules folder, all the Métis Boyte modules are contained in this directory.

23
00:02:16,350 --> 00:02:22,440
‫Now, the module's directory is where you will find the actual MSF modules for exports, auxiliaries,

24
00:02:22,830 --> 00:02:31,290
‫post modules, payloads, encoders and NLB generators, and you will be interacting with Métis Boit,

25
00:02:31,560 --> 00:02:33,020
‫mostly by module.

26
00:02:33,900 --> 00:02:40,830
‫The primary directory for modules is user share Métis flight framework modules.

27
00:02:41,100 --> 00:02:47,010
‫But you can use your own modules from your home directory at MSF for modules.

28
00:02:48,860 --> 00:02:55,150
‫Plugins folder, and as I said before, Métis Point is not a rigid tool.

29
00:02:56,230 --> 00:03:02,260
‫You can customize it and add plug ins to increase its power, so you're going to find these plug ins

30
00:03:02,260 --> 00:03:03,580
‫in this directory.

31
00:03:04,660 --> 00:03:07,630
‫So the common plug ins are open, Vachss.

32
00:03:09,080 --> 00:03:11,330
‫Next, Bozie Nessus.

33
00:03:12,360 --> 00:03:17,430
‫And a variety of others which can be loaded into the framework using the load command.

34
00:03:18,550 --> 00:03:24,460
‫Scripts, the scripts directory contains met typewriter and other scripts.

35
00:03:25,610 --> 00:03:31,100
‫Now, I'm going to show you some of the interpreter scripts, these scripts help you to automate some

36
00:03:31,100 --> 00:03:37,040
‫of the post exploitation jobs, such as keyboard recording, dumping password hashes and, well, getting

37
00:03:37,040 --> 00:03:39,410
‫much more information from the compromised system.

38
00:03:41,650 --> 00:03:42,220
‫Tool's.

39
00:03:43,120 --> 00:03:49,960
‫The Tools directory has various useful command line utilities that aid and penetration testing and that's

40
00:03:49,960 --> 00:03:51,670
‫contained in this folder.

41
00:03:54,280 --> 00:03:59,320
‫I also want to show you how to view the Métis point directly from the Gooey.

42
00:04:02,880 --> 00:04:08,160
‫Now, this will be way more helpful to you, get a better understanding of the framework and all of

43
00:04:08,160 --> 00:04:09,150
‫its components.

44
00:04:10,750 --> 00:04:12,340
‫So from folder view.

45
00:04:13,920 --> 00:04:14,490
‫User.

46
00:04:22,250 --> 00:04:23,870
‫Med's Voit framework.

47
00:04:25,300 --> 00:04:27,160
‫And now you're in the Métis boy directory.

48
00:04:28,580 --> 00:04:31,250
‫You can open the folders that you have viewed from the terminal.

